Lines Matching refs:execution
7 and speculative execution on modern CPUs to read memory, possibly
8 bypassing access controls. Speculative execution side channel exploits
16 Speculative execution side channel methods affect a wide range of modern
18 use branch prediction and speculative execution.
56 influence the speculative execution paths, and then use the side effects
57 of the speculative execution in the CPUs' caches and buffers to infer
58 privileged data touched during the speculative execution.
60 Spectre variant 1 attacks take advantage of speculative execution of
62 execution of indirect branches to leak privileged memory.
70 of speculative execution that bypasses conditional branch instructions
93 execution of indirect branches :ref:`[3] <spec_ref3>`. The indirect
98 execution can be measured to infer data values.
120 subroutine return instruction execution to go to a gadget. An attacker's
131 speculative execution's side effects left in level 1 cache to infer the
164 for speculative execution. This could cause privileged memory to be
208 execution.
211 speculative execution, he would also need to pass a parameter to the
218 indirect branches. Return trampolines trap speculative execution paths
219 to prevent jumping to gadget code during speculative execution.
287 the kernel to jump to gadget code in the speculative execution paths.
313 speculation execution paths in the victim guest.
467 addresses. Speculative execution paths under retpolines are trapped
468 in an infinite loop to prevent any speculative execution jumping to
687 [1] `Intel analysis of speculative execution side channels <https://newsroom.intel.com/wp-content/u…
731 …sponse on speculative execution and side channel vulnerabilities <https://www.mips.com/blog/mips-r…